Skip to main content
Home Home
  • Podcasts
  • Tech Articles
  • Top 10s
  • Content
    Topics
    • AI
    • Data
    • Emerging Technologies
    • Infrastructure Management
    • Security
    • In The News
    Media
    • Tech Articles
    • Podcasts
    • Top 10s
    • Whitepapers
    • Press Releases
    • Video Resources
  • Solution Providers
  • Industry Leaders
  • Sign In
  • Join the community
Home
Get Started
  • Access expert IT resources for free
  • Discover actionable insights from industry experts
  • Network with IT professionals and grow your network
  • Unlock exclusive analyst-led content
  • Share your thoughts with our global IT community
Coming Soon...
  • Access free expert IT resources
  • Network with professionals and industry leaders
  • Gain exclusive insights from a global IT community

Or

Sign up with LinkedIn
Sign up with Github
Sign up with Google
Signup as business
Already have account?
Privacy Policy
Contact us
Showing results for
  • Content
  • Industry experts
  • Solution providers
  • Events
No matches found
Explore by topics
Explore by type
Loading content ...
Loading content ...
Loading content ...
No result found for
Podcasts
Tech articles
Top 10s
  • AI
  • Data
  • Emerging Technologies
  • Infrastructure Management
  • Security
  • In the news
  • Press release
  • Video resources
  • Whitepapers
Industry Leaders
Media partners
Solution Providers
Events
  • About us
  • Contact us
  • FAQs
em360tech image
Guru

Richard
Stiennon

Chief Research Analyst at IT-Harvest
19 followers
0 following
Message
Follow

Work experience

IT-Harvest
Chief Research Analyst
( Nov 2017 - Present )
saf ai Inc
Advisory Board Member
( Mar 2022 - Aug 2023 )
..see more
Quick Heal
Board Member
( Sep 2021 - Present )
Anitian
Member of Board of Directors
( May 2019 - Present )
Phosphorus Cybersecurity
Member of Advisory Board
( Feb 2019 - Present )

Areas of Expertise

  • Security

About

United States
Richard Stiennon is Chief Research Analyst for IT-Harvest, the firm he founded in 2005 to cover the 4,070+ vendors that make up the IT security industry. He has presented on the topic of cybersecurity in 32 countries on six continents. He was a lecturer at Charles Sturt University in Australia. He is the author of Surviving Cyberwar (Government Institutes, 2010) and Washington Post Best Seller, There Will Be Cyberwar. His research appears on Substack. Stiennon was Chief Strategy Officer for Blancco Technology Group, the Chief Marketing Officer for Fortinet, Inc. and VP Threat Research at Webroot Software. Prior to that he was VP Research at Gartner. He has a B.S. in Aerospace Engineering from the University of Michigan, and his MA in War in the Modern World from King’s College, London. His latest book Security Yearbook 2025 was published by Wiley in April, 2025.

...see more

Social media links

Analysts with similar expertise

Aparna Sundararajan
em360tech image

Aparna Sundararajan

Strategic Advisor - Secure AI at Rain Consulting Services
Alejandro Leal
em360tech image

Alejandro Leal

Senior Analyst at KuppingerCole Analysts
Evgeniy Kharam
em360tech image

Evgeniy Kharam

Founder at EK Cyber and Media Consulting
View more
Read Palo Alto Networks: Optimising Managed Detection and Response (MDR) with Automation
palo alto networks
Security
Palo Alto Networks: Optimising Managed Detection and Response (MDR) with Automation
1 min
Read Thoropass: Innovating in the Audit Space
thoropass podcast
Security
Thoropass: Innovating in the Audit Space
1 min
Read Qwiet AI: The Intersection of AI and Application Security
radware
Security
Qwiet AI: The Intersection of AI and Application Security
1 min
Read Zero Networks: The Problem with VPNs
zero networks
Security
Zero Networks: The Problem with VPNs
1 min
Read Palo Alto Networks: The Role of Automation in Rapid Breach Response
palo alto networks
Security
Palo Alto Networks: The Role of Automation in Rapid Breach Response
1 min
Read Thoropass: Fixing the Broken Audit Process
thoropass podcast
Security
Thoropass: Fixing the Broken Audit Process
1 min
Read Palo Alto Networks: Using Threat Intelligence Effectively in Incident Investigation
palo alto networks
Security
Palo Alto Networks: Using Threat Intelligence Effectively in Incident Investigation
1 min
Read Savvy: SaaS Identity Discovery and Visibility
savvy
Data
Savvy: SaaS Identity Discovery and Visibility
1 min
Read Cyera: Why Data Defence is so Difficult in the TikTok Era
cyera
Security
Cyera: Why Data Defence is so Difficult in the TikTok Era
1 min
Read Cyera: How Generative AI is Driving Investments in Data Security
cyera
Security
Cyera: How Generative AI is Driving Investments in Data Security
1 min
Read Huntress: The Future of Cybersecurity Leadership
huntress
Security
Huntress: The Future of Cybersecurity Leadership
1 min
Read Cyera: Revolutionising Data Security for the Cloud Era
cyera
Security
Cyera: Revolutionising Data Security for the Cloud Era
1 min
  • Load more
EM360Tech Homepage em360tech.com

Access the latest analyst-led podcasts, tech articles, and industry resources as you connect with some of the brightest minds in enterprise tech.

  • x-icon x.com
  • linkedin-icon LinkedIn
  • youtube-icon YouTube

Topics

  • AI
  • Data
  • Emerging Technologies
  • Infrastructure Management
  • Security

Resources

  • Articles
  • Podcasts
  • Top 10s
  • Videos
  • Whitepapers

Collaborators

  • Events
  • Experts
  • Media Partners
  • Solution Providers

Company

  • About
  • Blogs
  • FAQ
  • Our Services

Subscribe to the EM360Tech Newsletter

  • Contact Us
  • Our Services
  • Blogs
  • Privacy Policy
  • Editorial Policy
  • GDPR Policy
  • Sitemap

All rights reserved. ©2025

Enterprise Management 360